|
1. A method of processing an index comprising:
receiving (1) a portion of an index that includes metadata associated with a corresponding element in a file system hierarchy and (2) an identifier, wherein:
the received portion of the index includes a node component and the included metadata includes (1) an mode number of the corresponding element in the file system hierarchy and (2) one or more attributes associated with the corresponding element in the file system hierarchy;
there are a plurality of indexes and each of the plurality of indexes is associated with a unique identifier; and
a given index has a plurality of portions and all of the plurality of portions for a given index are associated with a same identifier;
using a processor to determine whether the received identifier, associated with the index for which the portion is received, is already stored;
storing the received portion of the index in a new entry, if it is determined that the received identifier is not already stored; and
storing the received portion of the index in the same entry as the stored identifier, if it is determined that the received identifier is already stored.
14. A computer readable storage medium having computer instructions encoded thereon which when executed by a computer cause the computer to:
receive (1) a portion of an index that includes metadata associated with a corresponding element in a file system hierarchy and (2) an identifier, wherein:
the received portion of the index includes a node component and the included metadata includes (1) an mode number of the corresponding element in the file system hierarchy and (2) one or more attributes associated with the corresponding element in the file system hierarchy;
there are a plurality of indexes and each of the plurality of indexes is associated with a unique identifier; and
a given index has a plurality of portions and all of the plurality of portions for a given index are associated with a same identifier;
determine whether the received identifier, associated with the index for which the portion is received, is already stored;
store the received portion of the index in a new entry, if it is determined that the received identifier is not already stored; and
store the received portion of the index in the same entry as the stored identifier, if it is determined that the identifier is stored.
8. A system of processing an index comprising:
a processor configured to:
receive (1) a portion of an index that includes metadata associated with a corresponding element in a file system hierarchy and (2) an identifier, wherein:
the received portion of the index includes a node component and the included metadata includes (1) an mode number of the corresponding element in the file system hierarchy and (2) one or more attributes associated with the corresponding element in the file system hierarchy;
there are a plurality of indexes and each of the plurality of indexes is associated with a unique identifier; and
a given index has a plurality of portions and all of the plurality of portions for a given index are associated with a same identifier;
determine whether the received identifier, associated with the index for which the portion is received, is already stored;
store the received portion of the index in a new entry, if it is determined that the received identifier is not already stored; and
store the received portion of the index in the same entry as the stored identifier, if it is determined that the identifier is stored; and
a memory coupled to the processor, wherein the memory provides the processor with instructions.
2. The method of claim 1, wherein the received portion of the index is stored on disk.
3. The method of claim 1, wherein the identifier is a unique identifier is an mode number, and/or is stored on disk.
4. The method of claim 1, further comprising finding a first identifier and also finding an entry with a parent identifier that matches the first identifier.
5. The method claim 4, wherein the found entry with the matching parent identifier is identified as the next level of an index tree.
6. The method of claim 1, wherein:
the received identifier includes an mode number;
determining whether the received identifier is already stored includes accessing a balancing tree and determining whether the mode number is already stored in the balancing tree; and
the method further includes storing the mode number in the balancing tree, if it is determined that the mode number is not already stored in the balancing tree.
7. The method of claim 1, wherein the received portion of the index includes a DIR component and the included metadata includes (1) an mode number of the corresponding element in the file system hierarchy and (2) a parent mode node number of a parent of the corresponding element in the file system hierarchy.
9. The system of claim 8, wherein the received portion of the index is stored on disk.
10. The system of claim 8, wherein the processor is further configured to find a first identifier and also finding an entry with a parent identifier that matches the first identifier.
11. The system claim 10, wherein the found entry with the matching parent identifier is identified as the next level of an index tree.
12. The system of claim 8, wherein:
the received identifier includes an mode number;
the processor is configured to determine whether the received identifier is already stored by accessing a balancing tree and determining whether the mode number is already stored in the balancing tree; and
the processor is further configured to store the mode number in the balancing tree, if it is determined that the mode number is not already stored in the balancing tree.
13. The system of claim 8, wherein the received portion of the index includes a DIR component and the included metadata includes (1) an mode number of the corresponding element in the file system hierarchy and (2) a parent mode node number of a parent of the corresponding element in the file system hierarchy.
15. The computer program product of claim 14, further comprising finding a first identifier and also finding an entry with a parent identifier that matches the first identifier.
16. The computer program product of claim 14, wherein:
the received identifier includes an mode number;
the computer instructions for determining whether the received identifier is already stored include computer instructions for accessing a balancing tree and determining whether the mode number is already stored in the balancing tree; and
the computer program product further includes computer instructions for storing the mode number in the balancing tree, if it is determined that the mode number is not already stored in the balancing tree.
17. The computer program product of claim 14, wherein the received portion of the index includes a DIR component and the included metadata includes (1) an mode number of the corresponding element in the file system hierarchy and (2) a parent mode node number of a parent of the corresponding element in the file system hierarchy.
|
The present invention relates to computer environments, more specifically to data backup.
It is a common practice to back up data in a computer environment. When the data is backed up to a backup medium, such as a tape drive or a hard drive, additional information, herein referred to as the index, can also be delivered from the computer system which is backing up its data. The index provides information about the data that is being backed up, such as how the backup data is organized. The index is often received in a random order and the received index typically needs to be reorganized. For a large number of indexes, the organization of the index at the end of the backup, can take a very long time and consume high system resources. It would be desirable to be able to organize the index in a way that avoids the extremely long time periods typically required to rebuild the index.
Various embodiments of the invention are disclosed in the following detailed description and the accompanying drawings.
FIG. 1 is a block diagram of a system suitable for executing the invention.
FIGS. 2A-2B are flow diagrams of a method according to some embodiments for processing an index.
FIG. 3 is a flow diagram of a method for processing an index according to some embodiments.
FIG. 4 is an example of a index tree as discussed in conjunction to FIG. 3 with index entries identified by inode numbers according to some embodiments.
FIG. 5 is a flow diagram of a method for index processing according to some embodiments.
The invention can be implemented in numerous ways, including as a process, an apparatus, a system, a composition of matter, a computer readable medium such as a computer readable storage medium or a computer network. In this specification, these implementations, or any other form that the invention may take, may be referred to as techniques. In general, the order of the steps of disclosed processes may be altered within the scope of the invention.
A detailed description of one or more embodiments of the invention is provided below along with accompanying figures that illustrate the principles of the invention. The invention is described in connection with such embodiments, but the invention is not limited to any embodiment. The scope of the invention is limited only by the claims and the invention encompasses numerous alternatives, modifications and equivalents. Numerous specific details are set forth in the following description in order to provide a thorough understanding of the invention. These details are provided for the purpose of example and the invention may be practiced according to the claims without some or all of these specific details. For the purpose of clarity, technical material that is known in the technical fields related to the invention has not been described in detail so that the invention is not unnecessarily obscured.
FIG. 1 is a block diagram of a system suitable for executing the invention. In this example, a data server 100 is shown to send data to a backup medium 102. The data server 100 also sends the index to backup server 104.
FIG. 2 is a flow diagram of a method according to some embodiments for processing an index. In this example, an index is received in pieces. For example, an index for a particular piece of data may have a DIR component and a NODE component, wherein the DIR includes an inode number, parent inode number, and name of the index. In this embodiment, the inode number is a unique number identifying the index. The NODE component of the index also includes the inode number that matches the DIR inode number, as well as index attributes, such as stat info. Examples of stat info include information about the index such as size, type, permissions, creation and modification date.
In this example, an index component is received (200). An index component as used herein is a portion of an index, such as a DIR component or a NODE component. It is then determined whether the inode number of the index component is already stored (202). In one embodiment, the inode number is stored in an on-disk balancing tree structure such as a B+ tree. The B+ tree structure can be used in conjunction with a search library, such as WISS from Legato, Inc., a division of EMC. In some embodiments, an inode number can be a unique number identifying an index and all of the index components of that index are associated with that number.
If the inode number of this particular index is not found to be stored, then the received index component is stored as a new entry (208). For example, if a NODE component is received and inode number of this particular index is not found to be stored in the balancing tree on disk, then this received component is stored in the balancing tree as a new entry.
If the inode number of this particular index is found to be stored, then it is determined whether the received index component is a DIR (204). If it is not a DIR, then it is assumed to be a NODE component and it is written in the same entry as the matching stored inode numbers for all matching inode numbers (210). If the received index component is a DIR (204), then it is determined whether the matching stored index entry includes a NODE (206). If not, then the received DIR is stored as a new entry (212).
If the matching stored index entry includes a NODE (206), then it is determined whether one of the matching stored index entries is a DIR (220). If no DIR components with the matching inode number are already stored but there is a NODE entry, then the matching NODE entry is updated with this received DIR component (224). If, however, one of the matching stored index entries is a DIR (220), then the NODE attribute is copied from one of the matching entries and stored with the receiving DIR component in a new entry (222).
FIG. 3 is a flow diagram of a method for processing an index according to some embodiments. In this example, the pieces of the indexes have been restructured, stored in the balancing tree as index entries, and the index tree is being reconstructed. FIG. 3 is best understood when discussed in conjunction with FIG. 4.
FIG. 4 is an example of an index tree as discussed in conjunction with FIG. 3, with indexes identified by inode numbers according to some embodiments. In this example, the tree is shown to include an index structure with the top index having the inode number 2. Indexes with inode numbers 3 and 4 are shown to be the children of the inode number 2; and inode numbers 5, 6, 7, and 8 being the children of inode numbers 3 and 4. Inode number 2 is herein referred to as the parent of inode number 3 and inode number 4; and inode number 3 is referred to as the parent of inode number 5 and inode number 6. In this example, inode number 2 can be a directory which includes a directory with inode number 3 and another directory with inode number 4. Inode number 3 is a directory with a file having the inode number 5 and another file having the inode number 6.
In the example shown in FIG. 3, the topmost inode number is found from the stored inode numbers (300). For example, it can be predetermined that the topmost inode number in the tree is inode number 2. Accordingly, a search can be performed in the balancing tree, such as a B+tree, to find inode number 2.
Index entries whose parents are the topmost inode number are then found (302). For example, in the example shown in FIG. 4, the indexes whose parents are the topmost inode number is inode number 3 and inode number 4. Accordingly, a search can be performed in the balancing tree based on parent information to find the index entries with parent equaling inode number 2. In some embodiments, the parent inode number is stored in the DIR component of the index.
These index entries are identified as the next level of the index tree (304). It is then determined whether there are entries with these inode numbers as parents (306). If there are no index entries with these inode numbers as parents, then the restructuring is complete. If, however, there are entries with these inode numbers as parents, then the newly discovered index entries are identified as the next level of the index tree (304).
FIG. 5 is a flow diagram of a method for index processing according to some embodiments. In this example, the index is delivered from the data server to the backup server in a single piece rather than receiving multiple pieces of an index. Here, the inode number is not received, rather the path of the index is received. For example, index d can be received with the path of a/b/c/d, where c is the parent of d, b is the parent of c, and a is the parent of b. In addition, another index d, along with its path, can be received, where index d is not the same as index d. A file with the same name can occur under different directories for example a/c/b/d, where these files do not have the same path. Accordingly, a search by name, such as d, is not in helpful in this example. In some embodiments, a pseudo inode number is generated for the entries in the path. In some embodiments, this inode number is unique. A directory tree can be generated in memory which includes the index name, its assigned inode number, and its parent's assigned inode number such that a quick search can be performed by searching for either the inode number or the parent inode number.
In the example shown in FIG. 5, an index is received with a path for the index, such as a/b/c/d (500). It is determined whether a path entry is retrieved from the path (502). If a path entry is not retrieved from the path, then the process is complete. If a path entry, such as “b”, is retrieved from the path, then the parent inode number is retrieved from a directory tree (504). The directory tree includes a list of directories. In some embodiments, the directory tree is stored in memory while the index tree is stored on disk. It is then determined whether the path entry is in the directory tree (506). If the path entry is already in the directory tree, then the next entry is retrieved from the received path (502). In some embodiments, the path entries are retrieved from left to right—from parent to child—such as a, then b, then c, then d in the example of a path a/b/c/d.
If the path entry is not in the directory tree (506), then a unique inode number is assigned to this path entry (508) in this example. It is determined whether the path entry is a directory (510). In some embodiments, files are not saved in the directory tree while directories are saved. Directories have at least one child while files do not. If the path entry is a directory, then it is added to the directory tree (512). In some embodiments, the directory name, its assigned inode number and its parents assigned inode number are stored in the directory tree. For example, if the path a/b/c/d has been received for index “d”, and “c” has been assigned the inode number 4 and “d” is assigned inode number 5, then “d”'s parent inode number is 4. Whether the path entry is added to the directory tree (512) or the path entry is a directory (510), the index is stored in the balance tree on disk (514). The next path entry is then retrieved (502) if one is available.
Thereafter, the index tree can be rebuilt in some embodiments according to a method similar to that exemplified in FIG. 3. In this embodiment, the directory tree stored in memory is searched rather than the balancing tree to find the inode numbers and parent inode numbers.
Although the foregoing embodiments have been described in some detail for purposes of clarity of understanding, the invention is not limited to the details provided. There are many alternative ways of implementing the invention. The disclosed embodiments are illustrative and not restrictive.
Pallapotu, Ramesh
Patent |
Priority |
Assignee |
Title |
7882068, |
Aug 21 2007 |
EMC IP HOLDING COMPANY LLC |
Systems and methods for adaptive copy on write |
7900015, |
Apr 13 2007 |
EMC IP HOLDING COMPANY LLC |
Systems and methods of quota accounting |
7917474, |
Oct 21 2005 |
EMC IP HOLDING COMPANY LLC |
Systems and methods for accessing and updating distributed data |
7949692, |
Aug 21 2007 |
EMC IP HOLDING COMPANY LLC |
Systems and methods for portals into snapshot data |
7962779, |
Aug 03 2001 |
EMC IP HOLDING COMPANY LLC |
Systems and methods for a distributed file system with data recovery |
7966289, |
Aug 21 2007 |
EMC IP HOLDING COMPANY LLC |
Systems and methods for reading objects in a file system |
8005865, |
Mar 31 2006 |
EMC IP HOLDING COMPANY LLC |
Systems and methods for notifying listeners of events |
8010493, |
Aug 18 2006 |
EMC IP HOLDING COMPANY LLC |
Systems and methods for a snapshot of data |
8015156, |
Aug 18 2006 |
EMC IP HOLDING COMPANY LLC |
Systems and methods for a snapshot of data |
8015216, |
Apr 13 2007 |
EMC IP HOLDING COMPANY LLC |
Systems and methods of providing possible value ranges |
8027984, |
Aug 18 2006 |
EMC IP HOLDING COMPANY LLC |
Systems and methods of reverse lookup |
8051425, |
Oct 29 2004 |
EMC IP HOLDING COMPANY LLC |
Distributed system with asynchronous execution systems and methods |
8054765, |
Oct 21 2005 |
EMC IP HOLDING COMPANY LLC |
Systems and methods for providing variable protection |
8055711, |
Oct 29 2004 |
EMC IP HOLDING COMPANY LLC |
Non-blocking commit protocol systems and methods |
8060521, |
Dec 22 2006 |
EMC IP HOLDING COMPANY LLC |
Systems and methods of directory entry encodings |
8082379, |
Jan 05 2007 |
EMC IP HOLDING COMPANY LLC |
Systems and methods for managing semantic locks |
8112395, |
Aug 03 2001 |
EMC IP HOLDING COMPANY LLC |
Systems and methods for providing a distributed file system utilizing metadata to track information about data stored throughout the system |
8140623, |
Oct 29 2004 |
EMC IP HOLDING COMPANY LLC |
Non-blocking commit protocol systems and methods |
8176013, |
Oct 21 2005 |
EMC IP HOLDING COMPANY LLC |
Systems and methods for accessing and updating distributed data |
8195905, |
Apr 13 2007 |
EMC IP HOLDING COMPANY LLC |
Systems and methods of quota accounting |
8200632, |
Aug 21 2007 |
EMC IP HOLDING COMPANY LLC |
Systems and methods for adaptive copy on write |
8214334, |
Oct 21 2005 |
EMC IP HOLDING COMPANY LLC |
Systems and methods for distributed system scanning |
8214400, |
Oct 21 2005 |
EMC IP HOLDING COMPANY LLC |
Systems and methods for maintaining distributed data |
8238350, |
Oct 29 2004 |
EMC IP HOLDING COMPANY LLC |
Message batching with checkpoints systems and methods |
8286029, |
Dec 21 2006 |
EMC IP HOLDING COMPANY LLC |
Systems and methods for managing unavailable storage devices |
8356013, |
Aug 18 2006 |
EMC IP HOLDING COMPANY LLC |
Systems and methods for a snapshot of data |
8356150, |
Aug 18 2006 |
EMC IP HOLDING COMPANY LLC |
Systems and methods for providing nonlinear journaling |
8380689, |
Aug 18 2006 |
EMC IP HOLDING COMPANY LLC |
Systems and methods for providing nonlinear journaling |
8625464, |
Feb 17 2006 |
EMC IP HOLDING COMPANY LLC |
Systems and methods for providing a quiescing protocol |
8966080, |
Apr 13 2007 |
EMC IP HOLDING COMPANY LLC |
Systems and methods of managing resource utilization on a threaded computer system |
Patent |
Priority |
Assignee |
Title |
5870747, |
Jul 09 1996 |
International Business Machines Corporation |
Generalized key indexes |
6061692, |
Nov 04 1997 |
Microsoft Technology Licensing, LLC |
System and method for administering a meta database as an integral component of an information server |
6381605, |
May 29 1999 |
Oracle International Corporation |
Heirarchical indexing of multi-attribute data by sorting, dividing and storing subsets |
6427123, |
Feb 18 1999 |
Oracle International Corporation |
Hierarchical indexing for accessing hierarchically organized information in a relational system |
6513028, |
Jun 25 1999 |
International Business Machines Corporation |
Method, system, and program for searching a list of entries when search criteria is provided for less than all of the fields in an entry |
6591269, |
May 19 1999 |
SYBASE, INC |
Database system with methodology for online index rebuild |
7165082, |
Oct 31 2003 |
ACQUIOM AGENCY SERVICES LLC, AS ASSIGNEE |
Incremental method for backup of email messages |
20030033285, |
|
|
|
EP774715, |
|
|
|
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Sep 30 2004 | | EMC Corporation | (assignment on the face of the patent) | | / |
Dec 21 2004 | PALLAPOTU, RAMESH | EMC Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 015582 | /0868 |
pdf |
Sep 06 2016 | EMC Corporation | EMC IP HOLDING COMPANY LLC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 040203 | /0001 |
pdf |
Sep 07 2016 | EMC Corporation | CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLATERAL AGENT | SECURITY AGREEMENT | 040134 | /0001 |
pdf |
Sep 07 2016 | MOZY, INC | CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLATERAL AGENT | SECURITY AGREEMENT | 040134 | /0001 |
pdf |
Sep 07 2016 | SCALEIO LLC | CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLATERAL AGENT | SECURITY AGREEMENT | 040134 | /0001 |
pdf |
Sep 07 2016 | Spanning Cloud Apps LLC | CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLATERAL AGENT | SECURITY AGREEMENT | 040134 | /0001 |
pdf |
Sep 07 2016 | WYSE TECHNOLOGY L L C | CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLATERAL AGENT | SECURITY AGREEMENT | 040134 | /0001 |
pdf |
Sep 07 2016 | EMC Corporation | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENT | SECURITY AGREEMENT | 040136 | /0001 |
pdf |
Sep 07 2016 | WYSE TECHNOLOGY L L C | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENT | SECURITY AGREEMENT | 040136 | /0001 |
pdf |
Sep 07 2016 | DELL SYSTEMS CORPORATION | CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLATERAL AGENT | SECURITY AGREEMENT | 040134 | /0001 |
pdf |
Sep 07 2016 | Maginatics LLC | CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLATERAL AGENT | SECURITY AGREEMENT | 040134 | /0001 |
pdf |
Sep 07 2016 | FORCE10 NETWORKS, INC | CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLATERAL AGENT | SECURITY AGREEMENT | 040134 | /0001 |
pdf |
Sep 07 2016 | EMC IP HOLDING COMPANY LLC | CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLATERAL AGENT | SECURITY AGREEMENT | 040134 | /0001 |
pdf |
Sep 07 2016 | DELL SOFTWARE INC | CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLATERAL AGENT | SECURITY AGREEMENT | 040134 | /0001 |
pdf |
Sep 07 2016 | Dell Products L P | CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLATERAL AGENT | SECURITY AGREEMENT | 040134 | /0001 |
pdf |
Sep 07 2016 | DELL MARKETING L P | CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLATERAL AGENT | SECURITY AGREEMENT | 040134 | /0001 |
pdf |
Sep 07 2016 | DELL INTERNATIONAL L L C | CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLATERAL AGENT | SECURITY AGREEMENT | 040134 | /0001 |
pdf |
Sep 07 2016 | Dell USA L P | CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLATERAL AGENT | SECURITY AGREEMENT | 040134 | /0001 |
pdf |
Sep 07 2016 | CREDANT TECHNOLOGIES, INC | CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLATERAL AGENT | SECURITY AGREEMENT | 040134 | /0001 |
pdf |
Sep 07 2016 | Aventail LLC | CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLATERAL AGENT | SECURITY AGREEMENT | 040134 | /0001 |
pdf |
Sep 07 2016 | ASAP SOFTWARE EXPRESS, INC | CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLATERAL AGENT | SECURITY AGREEMENT | 040134 | /0001 |
pdf |
Sep 07 2016 | Spanning Cloud Apps LLC | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENT | SECURITY AGREEMENT | 040136 | /0001 |
pdf |
Sep 07 2016 | SCALEIO LLC | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENT | SECURITY AGREEMENT | 040136 | /0001 |
pdf |
Sep 07 2016 | MOZY, INC | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENT | SECURITY AGREEMENT | 040136 | /0001 |
pdf |
Sep 07 2016 | ASAP SOFTWARE EXPRESS, INC | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENT | SECURITY AGREEMENT | 040136 | /0001 |
pdf |
Sep 07 2016 | CREDANT TECHNOLOGIES, INC | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENT | SECURITY AGREEMENT | 040136 | /0001 |
pdf |
Sep 07 2016 | Dell USA L P | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENT | SECURITY AGREEMENT | 040136 | /0001 |
pdf |
Sep 07 2016 | DELL INTERNATIONAL L L C | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENT | SECURITY AGREEMENT | 040136 | /0001 |
pdf |
Sep 07 2016 | DELL MARKETING L P | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENT | SECURITY AGREEMENT | 040136 | /0001 |
pdf |
Sep 07 2016 | Dell Products L P | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENT | SECURITY AGREEMENT | 040136 | /0001 |
pdf |
Sep 07 2016 | DELL SOFTWARE INC | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENT | SECURITY AGREEMENT | 040136 | /0001 |
pdf |
Sep 07 2016 | Maginatics LLC | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENT | SECURITY AGREEMENT | 040136 | /0001 |
pdf |
Sep 07 2016 | FORCE10 NETWORKS, INC | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENT | SECURITY AGREEMENT | 040136 | /0001 |
pdf |
Sep 07 2016 | EMC IP HOLDING COMPANY LLC | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENT | SECURITY AGREEMENT | 040136 | /0001 |
pdf |
Sep 07 2016 | DELL SYSTEMS CORPORATION | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENT | SECURITY AGREEMENT | 040136 | /0001 |
pdf |
Sep 07 2016 | Aventail LLC | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENT | SECURITY AGREEMENT | 040136 | /0001 |
pdf |
Mar 20 2019 | DELL INTERNATIONAL L L C | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A | SECURITY AGREEMENT | 049452 | /0223 |
pdf |
Mar 20 2019 | DELL MARKETING L P | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A | SECURITY AGREEMENT | 049452 | /0223 |
pdf |
Mar 20 2019 | Dell Products L P | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A | SECURITY AGREEMENT | 049452 | /0223 |
pdf |
Mar 20 2019 | Dell USA L P | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A | SECURITY AGREEMENT | 049452 | /0223 |
pdf |
Mar 20 2019 | FORCE10 NETWORKS, INC | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A | SECURITY AGREEMENT | 049452 | /0223 |
pdf |
Mar 20 2019 | WYSE TECHNOLOGY L L C | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A | SECURITY AGREEMENT | 049452 | /0223 |
pdf |
Mar 20 2019 | EMC IP HOLDING COMPANY LLC | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A | SECURITY AGREEMENT | 049452 | /0223 |
pdf |
Mar 20 2019 | EMC Corporation | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A | SECURITY AGREEMENT | 049452 | /0223 |
pdf |
Mar 20 2019 | CREDANT TECHNOLOGIES, INC | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A | SECURITY AGREEMENT | 049452 | /0223 |
pdf |
Apr 09 2020 | FORCE10 NETWORKS, INC | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A | SECURITY AGREEMENT | 053546 | /0001 |
pdf |
Apr 09 2020 | CREDANT TECHNOLOGIES INC | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A | SECURITY AGREEMENT | 053546 | /0001 |
pdf |
Apr 09 2020 | DELL INTERNATIONAL L L C | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A | SECURITY AGREEMENT | 053546 | /0001 |
pdf |
Apr 09 2020 | DELL MARKETING L P | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A | SECURITY AGREEMENT | 053546 | /0001 |
pdf |
Apr 09 2020 | Dell Products L P | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A | SECURITY AGREEMENT | 053546 | /0001 |
pdf |
Apr 09 2020 | Dell USA L P | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A | SECURITY AGREEMENT | 053546 | /0001 |
pdf |
Apr 09 2020 | EMC Corporation | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A | SECURITY AGREEMENT | 053546 | /0001 |
pdf |
Apr 09 2020 | WYSE TECHNOLOGY L L C | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A | SECURITY AGREEMENT | 053546 | /0001 |
pdf |
Apr 09 2020 | EMC IP HOLDING COMPANY LLC | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A | SECURITY AGREEMENT | 053546 | /0001 |
pdf |
Nov 01 2021 | Credit Suisse AG, Cayman Islands Branch | DELL INTERNATIONAL, L L C | RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS | 058216 | /0001 |
pdf |
Nov 01 2021 | Credit Suisse AG, Cayman Islands Branch | DELL MARKETING L P | RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS | 058216 | /0001 |
pdf |
Nov 01 2021 | Credit Suisse AG, Cayman Islands Branch | Dell Products L P | RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS | 058216 | /0001 |
pdf |
Nov 01 2021 | Credit Suisse AG, Cayman Islands Branch | DELL SOFTWARE INC | RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS | 058216 | /0001 |
pdf |
Nov 01 2021 | Credit Suisse AG, Cayman Islands Branch | DELL SYSTEMS CORPORATION | RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS | 058216 | /0001 |
pdf |
Nov 01 2021 | Credit Suisse AG, Cayman Islands Branch | EMC IP HOLDING COMPANY LLC | RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS | 058216 | /0001 |
pdf |
Nov 01 2021 | Credit Suisse AG, Cayman Islands Branch | FORCE10 NETWORKS, INC | RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS | 058216 | /0001 |
pdf |
Nov 01 2021 | Credit Suisse AG, Cayman Islands Branch | Maginatics LLC | RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS | 058216 | /0001 |
pdf |
Nov 01 2021 | Credit Suisse AG, Cayman Islands Branch | MOZY, INC | RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS | 058216 | /0001 |
pdf |
Nov 01 2021 | Credit Suisse AG, Cayman Islands Branch | WYSE TECHNOLOGY L L C | RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS | 058216 | /0001 |
pdf |
Nov 01 2021 | Credit Suisse AG, Cayman Islands Branch | Dell USA L P | RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS | 058216 | /0001 |
pdf |
Nov 01 2021 | Credit Suisse AG, Cayman Islands Branch | SCALEIO LLC | RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS | 058216 | /0001 |
pdf |
Nov 01 2021 | Credit Suisse AG, Cayman Islands Branch | CREDANT TECHNOLOGIES, INC | RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS | 058216 | /0001 |
pdf |
Nov 01 2021 | Credit Suisse AG, Cayman Islands Branch | Aventail LLC | RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS | 058216 | /0001 |
pdf |
Nov 01 2021 | Credit Suisse AG, Cayman Islands Branch | ASAP SOFTWARE EXPRESS, INC | RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS | 058216 | /0001 |
pdf |
Nov 01 2021 | Credit Suisse AG, Cayman Islands Branch | EMC Corporation | RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS | 058216 | /0001 |
pdf |
Mar 29 2022 | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENT | Dell USA L P | RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL FRAME 040136 0001 | 061324 | /0001 |
pdf |
Mar 29 2022 | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENT | DELL INTERNATIONAL L L C | RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL FRAME 040136 0001 | 061324 | /0001 |
pdf |
Mar 29 2022 | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENT | DELL MARKETING CORPORATION SUCCESSOR-IN-INTEREST TO ASAP SOFTWARE EXPRESS, INC | RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL FRAME 045455 0001 | 061753 | /0001 |
pdf |
Mar 29 2022 | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENT | DELL MARKETING CORPORATION SUCCESSOR-IN-INTEREST TO FORCE10 NETWORKS, INC AND WYSE TECHNOLOGY L L C | RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL FRAME 040136 0001 | 061324 | /0001 |
pdf |
Mar 29 2022 | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENT | EMC CORPORATION ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO MAGINATICS LLC | RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL FRAME 040136 0001 | 061324 | /0001 |
pdf |
Mar 29 2022 | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENT | EMC IP HOLDING COMPANY LLC ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO MOZY, INC | RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL FRAME 040136 0001 | 061324 | /0001 |
pdf |
Mar 29 2022 | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENT | SCALEIO LLC | RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL FRAME 040136 0001 | 061324 | /0001 |
pdf |
Mar 29 2022 | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENT | DELL MARKETING L P ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO CREDANT TECHNOLOGIES, INC | RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL FRAME 040136 0001 | 061324 | /0001 |
pdf |
Mar 29 2022 | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENT | DELL MARKETING CORPORATION SUCCESSOR-IN-INTEREST TO ASAP SOFTWARE EXPRESS, INC | RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL FRAME 040136 0001 | 061324 | /0001 |
pdf |
Mar 29 2022 | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENT | DELL MARKETING L P ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO CREDANT TECHNOLOGIES, INC | RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL FRAME 045455 0001 | 061753 | /0001 |
pdf |
Mar 29 2022 | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENT | Dell USA L P | RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL FRAME 045455 0001 | 061753 | /0001 |
pdf |
Mar 29 2022 | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENT | DELL INTERNATIONAL L L C | RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL FRAME 045455 0001 | 061753 | /0001 |
pdf |
Mar 29 2022 | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENT | Dell Products L P | RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL FRAME 045455 0001 | 061753 | /0001 |
pdf |
Mar 29 2022 | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENT | DELL MARKETING CORPORATION SUCCESSOR-IN-INTEREST TO FORCE10 NETWORKS, INC AND WYSE TECHNOLOGY L L C | RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL FRAME 045455 0001 | 061753 | /0001 |
pdf |
Mar 29 2022 | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENT | EMC CORPORATION ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO MAGINATICS LLC | RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL FRAME 045455 0001 | 061753 | /0001 |
pdf |
Mar 29 2022 | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENT | SCALEIO LLC | RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL FRAME 045455 0001 | 061753 | /0001 |
pdf |
Mar 29 2022 | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENT | EMC IP HOLDING COMPANY LLC ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO MOZY, INC | RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL FRAME 045455 0001 | 061753 | /0001 |
pdf |
Mar 29 2022 | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENT | Dell Products L P | RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL FRAME 040136 0001 | 061324 | /0001 |
pdf |
Date |
Maintenance Fee Events |
Nov 12 2013 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Oct 20 2017 | M1552: Payment of Maintenance Fee, 8th Year, Large Entity. |
Oct 20 2021 | M1553: Payment of Maintenance Fee, 12th Year, Large Entity. |
Date |
Maintenance Schedule |
May 11 2013 | 4 years fee payment window open |
Nov 11 2013 | 6 months grace period start (w surcharge) |
May 11 2014 | patent expiry (for year 4) |
May 11 2016 | 2 years to revive unintentionally abandoned end. (for year 4) |
May 11 2017 | 8 years fee payment window open |
Nov 11 2017 | 6 months grace period start (w surcharge) |
May 11 2018 | patent expiry (for year 8) |
May 11 2020 | 2 years to revive unintentionally abandoned end. (for year 8) |
May 11 2021 | 12 years fee payment window open |
Nov 11 2021 | 6 months grace period start (w surcharge) |
May 11 2022 | patent expiry (for year 12) |
May 11 2024 | 2 years to revive unintentionally abandoned end. (for year 12) |